SlideShare a Scribd company logo
Teamwork.com
SECURITY OVERVIEW
www.teamwork.com/security
More info at www.teamwork.com/security Page 2/12
Secure collaboration on your projects
with Teamwork.com
Over 250,000 companies worldwide in 147 countries trust Teamwork.com to manage their
projects in the cloud - and we take this trust very seriously. Our top priority is to ensure that
your project-related data remains secure and confidential, and we adhere to the highest
professional security standards to do so. Our goal is to provide you with an easy-to-use,
flexible, and scalable project management application with dependable service and
comprehensive security at all levels. And we succeed at this - we've never had a security
breach or lost customer files. To keep our environment secure, we constantly focus on
maintaining the reliability of our product, infrastructure, technologies, and procedures. Our
security model consists of three elements: physical, network, and content. Here's how we deal
with each of them..
More info at www.teamwork.com/security Page 3/12
Physical security
We host Teamwork.com within the Amazon's Web Services (AWS) environment. These are
world-class data centers and we make use of their web/application servers, file servers, and
databases. The Teamwork.com system spans several layers of the AWS in that we utilize the
Elastic Computing (EC2) for our application and web servers, and additionally for other file
servers. The file servers are connected to the AWS Storage facility (S3), while the application is
connected to the Relational Database System (RDS).
Key to all of our security measures is the physical security of the AWS data centers. The
buildings that house the centers have significant physical access control, and incorporate
extensive seismic bracing as well as the latest smoke and fire early-detection systems. The
sites are monitored constantly, 24x7x365, by digital surveillance systems.
More info at www.teamwork.com/security Page 4/12
The digital security of our system and your information resides behind the AWS firewall, Spam
and DOS protections, and is only visible to specifically monitored IP addresses. In effect, you
connect to Teamwork.com through an AWS load-balancer via the AWS network, so it shouldn't
matter where the computers are. But for reference, Teamwork.com straddles multiple 'zones'
in the Virginia AWS Data Center (a short walk away from the AWS U.S. government servers).
The third element of the physical security of your data is backups. At the AWS data
centers, all the databases are backed up twice a day by one of the file servers and then backed
up to the S3 storage. The RDS Databases are configured to point-in-time recovery, up to the
last 5 minutes, within the previous 3 day period, and snapshots of the Database servers are
taken every morning (GMT). All primary database servers have fully replicated slaves and are
always in sync. The application and file servers are snapshot on a regular schedule.
More info at www.teamwork.com/security Page 5/12
Along with the backups comes the ability to restore the data if needed, and our customer care
team can help you with this.
So, the physical location is secure, your data is safe behind firewalls and spam protections, and
you can retrieve anything from the data backups. But what of uptime, the security of being
able to access your projects on Teamwork.com whenever you want to?
Since launching our first product in 2007, Teamwork.com’s uptime has consistently exceeded
99%. Running Teamwork.com in the AWS environment, compared to a more traditional ISP
hosting provider, means that all services are essentially virtual, and so are not vulnerable to
physical hardware failures. Yes, we are sharing the AWS environment with many other
companies, but sharing resources is what is contributing to our outstanding uptime
percentage.
More info at www.teamwork.com/security Page 6/12
Network security
Network security consists of two elements that both need to be considered: the security of the
infrastructure itself and then of the data within it.
Industry standard protection procedures for our network infrastructure are an integral part of
Teamwork.com's engineering culture. Between us, we have many years of experience with
protection mechanisms such as firewalled servers and alert mechanisms. But these specifics
are based on years of experience, and a deep understanding of the entire picture of network
security: operations, back-end, front-end, and social engineering. Appreciating the whole
scope gives us the edge in our security measures.
More info at www.teamwork.com/security Page 7/12
The other side of network security is data protection. At Teamwork.com we encrypt all your
data with
256-bit Secure Socket Layer (SSL) with the AES algorithm and 2048-bit key length. You're secure
on two fronts as, when you access Teamwork.com, SSL technology protects your information
using both server authentication and data encryption. This is equivalent to the data security
methods used in banking and leading e-commerce sites. And we don't play favorites with our
data encryption - it's the same across the board, whatever your subscription type.
With the network secure and your data encrypted, we now turn to the security of the content
of your files.
More info at www.teamwork.com/security Page 8/12
Content security
Content security revolves around who has access to your data, whether it's our staff running
the data center infrastructure or your project team members who you give access rights to.
We'll start with us.
The Teamwork.com team members have years of experience in designing and operating data
centers, as well as in continually improving the processes that aren't working so well or that
can be adjusted to work more efficiently and effectively. Based on all our experience, we've
developed world class practices for managing security and data protection risk. We strongly
believe that designing and running a data center infrastructure requires not just technology,
but a disciplined approach to the processes involved - escalation, management, knowledge
sharing, risk, as well as the day-to-day operations.
More info at www.teamwork.com/security Page 9/12
It's not just our wealth of experience that sets us apart from other companies in this area, it's
also our
philosophy of teamwork. We have team members, not employees. An employee is a pawn to
be sacrificed, a team member will have your back. We know all members of our team
personally, and they have the highest clearance to access the data center data. That said, we
also strictly regulate access and passwords to those few team members who need to access
the customer data for troubleshooting or to provide support, and we keep a log of all such
access. And even then, we won't go into your data without your permission (perhaps as part of
a support incident), and into the data center data only on the go-ahead from senior security
management for support and maintenance.
And now about you. You control access to your data on Teamwork.com through user
authentication and user rights.
More info at www.teamwork.com/security Page 10/12
User authentication ensures that only valid users can get into your project management
system. Each
user in Teamwork.com has a unique account protected with a password. This account is tied to
a verified email address that must be entered when a user logs in. For additional security, you
have the option to require that passwords be high-security alphanumeric passwords.
Once in Teamwork.com, each user is limited in actions to those assigned to her by the
Teamwork.com Project Administrator through user-level granular, rights and permissions,
settings. Permissions allow a user to perform certain actions and activities within
Teamwork.com, such as adding and editing tasks, or deleting files. The Administrator and
Project Administrator have the power to determine who can do what in which project.
Content security is also about who can see what kinds of data are in your Teamwork.com
projects. Your projects and tasks are accessible only to you unless you explicitly share the data
with someone else in your account, or place the information in a shared notebook.
More info at www.teamwork.com/security Page 11/12
And the security of your data content itself should be of concern to you. What happens if you
accidentally delete something, or later decide that you do need data that you've gotten rid of?
We've covered this too. You can safely recover the accidentally deleted items from
Teamwork.com’s recycle bin at any time. And, just in case you've tidied up and emptied your
recycle bin, we keep a backup of the removed data for approximately two weeks. Contact our
customer support team in this period to restore it for you. And, if you delete a user who you
later want to reinstate, we can do that too, along with all her tasks, as long as you contact us
within a month.
phone: +353 86 047 0620 | e-mail: emmet.florish@teamwork.com Page 12/12
Want to know
more?
For further details on how Teamwork.com collects and processes your
information, please refer to our Privacy Policy. To learn more about how
Teamwork.com’s service is delivered, please read our Terms of Service. If you
have any questions about the security of Teamwork.com, contact us anytime at
support@teamwork.com and we’ll get back to you quickly.

More Related Content

What's hot

Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
sang yoo
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
ssuser1eca7d
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Ulf Mattsson
 
Cloud computinghuthcebula
Cloud computinghuthcebulaCloud computinghuthcebula
Cloud computinghuthcebula
Gopibabu Srungavarapu
 
Data breaach mitigation
Data breaach mitigationData breaach mitigation
Data breaach mitigation
CloudMask inc.
 
The Basics of Cloud Computing
The Basics of Cloud ComputingThe Basics of Cloud Computing
The Basics of Cloud Computing
Novinidea
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
Amazon Web Services
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Bloombase
 
DirectShare by Cloudtenna
DirectShare by CloudtennaDirectShare by Cloudtenna
DirectShare by Cloudtenna
Christian Petrou
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
IJECEIAES
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
Martin Bioh
 
CaelumOne Based Enterprise Content Management Solution
CaelumOne Based Enterprise Content Management SolutionCaelumOne Based Enterprise Content Management Solution
CaelumOne Based Enterprise Content Management Solution
TimMagill
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
thinkASG
 
Cloud
CloudCloud
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Benedek Menesi
 
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
Amazon Web Services
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
Md. Hasibur Rashid
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
Charles Rey
 
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Benedek Menesi
 

What's hot (20)

Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Cloud computinghuthcebula
Cloud computinghuthcebulaCloud computinghuthcebula
Cloud computinghuthcebula
 
Data breaach mitigation
Data breaach mitigationData breaach mitigation
Data breaach mitigation
 
The Basics of Cloud Computing
The Basics of Cloud ComputingThe Basics of Cloud Computing
The Basics of Cloud Computing
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
DirectShare by Cloudtenna
DirectShare by CloudtennaDirectShare by Cloudtenna
DirectShare by Cloudtenna
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
CaelumOne Based Enterprise Content Management Solution
CaelumOne Based Enterprise Content Management SolutionCaelumOne Based Enterprise Content Management Solution
CaelumOne Based Enterprise Content Management Solution
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
Cloud
CloudCloud
Cloud
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
 
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
 

Similar to Teamwork.com Security Overvew

Data Security
Data SecurityData Security
Data Security
qmsWrapper
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
Temok IT Services
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
Infosectrain3
 
Presentation1
Presentation1Presentation1
Presentation1
Kollipara Kiranmai
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
infosec train
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
edgar6wallace88877
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
Metaorange
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
Randall Spence
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
FREVVO
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
Procore Technologies
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
Revathiparamanathan
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
manoharparakh
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
CloudMask inc.
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 

Similar to Teamwork.com Security Overvew (20)

Data Security
Data SecurityData Security
Data Security
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Presentation1
Presentation1Presentation1
Presentation1
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 

Recently uploaded

如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
The Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdfThe Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdf
mohitd6
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
Pedro J. Molina
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
Zycus
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
kalichargn70th171
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
kalichargn70th171
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
TMU毕业证书精仿办理
TMU毕业证书精仿办理TMU毕业证书精仿办理
TMU毕业证书精仿办理
aeeva
 

Recently uploaded (20)

如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
The Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdfThe Role of DevOps in Digital Transformation.pdf
The Role of DevOps in Digital Transformation.pdf
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Orca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container OrchestrationOrca: Nocode Graphical Editor for Container Orchestration
Orca: Nocode Graphical Editor for Container Orchestration
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
 
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
bgiolcb
bgiolcbbgiolcb
bgiolcb
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
TMU毕业证书精仿办理
TMU毕业证书精仿办理TMU毕业证书精仿办理
TMU毕业证书精仿办理
 

Teamwork.com Security Overvew

  • 2. More info at www.teamwork.com/security Page 2/12 Secure collaboration on your projects with Teamwork.com Over 250,000 companies worldwide in 147 countries trust Teamwork.com to manage their projects in the cloud - and we take this trust very seriously. Our top priority is to ensure that your project-related data remains secure and confidential, and we adhere to the highest professional security standards to do so. Our goal is to provide you with an easy-to-use, flexible, and scalable project management application with dependable service and comprehensive security at all levels. And we succeed at this - we've never had a security breach or lost customer files. To keep our environment secure, we constantly focus on maintaining the reliability of our product, infrastructure, technologies, and procedures. Our security model consists of three elements: physical, network, and content. Here's how we deal with each of them..
  • 3. More info at www.teamwork.com/security Page 3/12 Physical security We host Teamwork.com within the Amazon's Web Services (AWS) environment. These are world-class data centers and we make use of their web/application servers, file servers, and databases. The Teamwork.com system spans several layers of the AWS in that we utilize the Elastic Computing (EC2) for our application and web servers, and additionally for other file servers. The file servers are connected to the AWS Storage facility (S3), while the application is connected to the Relational Database System (RDS). Key to all of our security measures is the physical security of the AWS data centers. The buildings that house the centers have significant physical access control, and incorporate extensive seismic bracing as well as the latest smoke and fire early-detection systems. The sites are monitored constantly, 24x7x365, by digital surveillance systems.
  • 4. More info at www.teamwork.com/security Page 4/12 The digital security of our system and your information resides behind the AWS firewall, Spam and DOS protections, and is only visible to specifically monitored IP addresses. In effect, you connect to Teamwork.com through an AWS load-balancer via the AWS network, so it shouldn't matter where the computers are. But for reference, Teamwork.com straddles multiple 'zones' in the Virginia AWS Data Center (a short walk away from the AWS U.S. government servers). The third element of the physical security of your data is backups. At the AWS data centers, all the databases are backed up twice a day by one of the file servers and then backed up to the S3 storage. The RDS Databases are configured to point-in-time recovery, up to the last 5 minutes, within the previous 3 day period, and snapshots of the Database servers are taken every morning (GMT). All primary database servers have fully replicated slaves and are always in sync. The application and file servers are snapshot on a regular schedule.
  • 5. More info at www.teamwork.com/security Page 5/12 Along with the backups comes the ability to restore the data if needed, and our customer care team can help you with this. So, the physical location is secure, your data is safe behind firewalls and spam protections, and you can retrieve anything from the data backups. But what of uptime, the security of being able to access your projects on Teamwork.com whenever you want to? Since launching our first product in 2007, Teamwork.com’s uptime has consistently exceeded 99%. Running Teamwork.com in the AWS environment, compared to a more traditional ISP hosting provider, means that all services are essentially virtual, and so are not vulnerable to physical hardware failures. Yes, we are sharing the AWS environment with many other companies, but sharing resources is what is contributing to our outstanding uptime percentage.
  • 6. More info at www.teamwork.com/security Page 6/12 Network security Network security consists of two elements that both need to be considered: the security of the infrastructure itself and then of the data within it. Industry standard protection procedures for our network infrastructure are an integral part of Teamwork.com's engineering culture. Between us, we have many years of experience with protection mechanisms such as firewalled servers and alert mechanisms. But these specifics are based on years of experience, and a deep understanding of the entire picture of network security: operations, back-end, front-end, and social engineering. Appreciating the whole scope gives us the edge in our security measures.
  • 7. More info at www.teamwork.com/security Page 7/12 The other side of network security is data protection. At Teamwork.com we encrypt all your data with 256-bit Secure Socket Layer (SSL) with the AES algorithm and 2048-bit key length. You're secure on two fronts as, when you access Teamwork.com, SSL technology protects your information using both server authentication and data encryption. This is equivalent to the data security methods used in banking and leading e-commerce sites. And we don't play favorites with our data encryption - it's the same across the board, whatever your subscription type. With the network secure and your data encrypted, we now turn to the security of the content of your files.
  • 8. More info at www.teamwork.com/security Page 8/12 Content security Content security revolves around who has access to your data, whether it's our staff running the data center infrastructure or your project team members who you give access rights to. We'll start with us. The Teamwork.com team members have years of experience in designing and operating data centers, as well as in continually improving the processes that aren't working so well or that can be adjusted to work more efficiently and effectively. Based on all our experience, we've developed world class practices for managing security and data protection risk. We strongly believe that designing and running a data center infrastructure requires not just technology, but a disciplined approach to the processes involved - escalation, management, knowledge sharing, risk, as well as the day-to-day operations.
  • 9. More info at www.teamwork.com/security Page 9/12 It's not just our wealth of experience that sets us apart from other companies in this area, it's also our philosophy of teamwork. We have team members, not employees. An employee is a pawn to be sacrificed, a team member will have your back. We know all members of our team personally, and they have the highest clearance to access the data center data. That said, we also strictly regulate access and passwords to those few team members who need to access the customer data for troubleshooting or to provide support, and we keep a log of all such access. And even then, we won't go into your data without your permission (perhaps as part of a support incident), and into the data center data only on the go-ahead from senior security management for support and maintenance. And now about you. You control access to your data on Teamwork.com through user authentication and user rights.
  • 10. More info at www.teamwork.com/security Page 10/12 User authentication ensures that only valid users can get into your project management system. Each user in Teamwork.com has a unique account protected with a password. This account is tied to a verified email address that must be entered when a user logs in. For additional security, you have the option to require that passwords be high-security alphanumeric passwords. Once in Teamwork.com, each user is limited in actions to those assigned to her by the Teamwork.com Project Administrator through user-level granular, rights and permissions, settings. Permissions allow a user to perform certain actions and activities within Teamwork.com, such as adding and editing tasks, or deleting files. The Administrator and Project Administrator have the power to determine who can do what in which project. Content security is also about who can see what kinds of data are in your Teamwork.com projects. Your projects and tasks are accessible only to you unless you explicitly share the data with someone else in your account, or place the information in a shared notebook.
  • 11. More info at www.teamwork.com/security Page 11/12 And the security of your data content itself should be of concern to you. What happens if you accidentally delete something, or later decide that you do need data that you've gotten rid of? We've covered this too. You can safely recover the accidentally deleted items from Teamwork.com’s recycle bin at any time. And, just in case you've tidied up and emptied your recycle bin, we keep a backup of the removed data for approximately two weeks. Contact our customer support team in this period to restore it for you. And, if you delete a user who you later want to reinstate, we can do that too, along with all her tasks, as long as you contact us within a month.
  • 12. phone: +353 86 047 0620 | e-mail: emmet.florish@teamwork.com Page 12/12 Want to know more? For further details on how Teamwork.com collects and processes your information, please refer to our Privacy Policy. To learn more about how Teamwork.com’s service is delivered, please read our Terms of Service. If you have any questions about the security of Teamwork.com, contact us anytime at support@teamwork.com and we’ll get back to you quickly.